IL253178B - Monitoring traffic in a computer network - Google Patents

Monitoring traffic in a computer network

Info

Publication number
IL253178B
IL253178B IL253178A IL25317817A IL253178B IL 253178 B IL253178 B IL 253178B IL 253178 A IL253178 A IL 253178A IL 25317817 A IL25317817 A IL 25317817A IL 253178 B IL253178 B IL 253178B
Authority
IL
Israel
Prior art keywords
computer network
monitoring traffic
traffic
monitoring
network
Prior art date
Application number
IL253178A
Other languages
Hebrew (he)
Other versions
IL253178A0 (en
Inventor
Haelion Erez Kaplan
Original Assignee
Cyber 2 0 2015 Ltd
Haelion Erez Kaplan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyber 2 0 2015 Ltd, Haelion Erez Kaplan filed Critical Cyber 2 0 2015 Ltd
Publication of IL253178A0 publication Critical patent/IL253178A0/en
Publication of IL253178B publication Critical patent/IL253178B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
IL253178A 2015-12-31 2017-06-26 Monitoring traffic in a computer network IL253178B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562273530P 2015-12-31 2015-12-31
PCT/IL2016/051381 WO2017115356A1 (en) 2015-12-31 2016-12-26 Monitoring traffic in a computer network ‎

Publications (2)

Publication Number Publication Date
IL253178A0 IL253178A0 (en) 2017-07-31
IL253178B true IL253178B (en) 2019-01-31

Family

ID=59224776

Family Applications (1)

Application Number Title Priority Date Filing Date
IL253178A IL253178B (en) 2015-12-31 2017-06-26 Monitoring traffic in a computer network

Country Status (10)

Country Link
US (3) US9794277B2 (en)
EP (1) EP3398291A4 (en)
JP (1) JP2019507412A (en)
KR (1) KR20180099683A (en)
CN (1) CN108476138A (en)
AU (1) AU2016381499A1 (en)
CA (1) CA3006418A1 (en)
IL (1) IL253178B (en)
SG (1) SG11201804315TA (en)
WO (1) WO2017115356A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200028856A1 (en) * 2018-07-23 2020-01-23 Cyber 2.0 (2015) LTD Port scrambling usage in heterogeneous networks
US20190089595A1 (en) * 2017-09-18 2019-03-21 Cyber 2.0 (2015) LTD Automatic security configuration
US10530752B2 (en) * 2017-03-28 2020-01-07 Amazon Technologies, Inc. Efficient device provision
US11356445B2 (en) 2017-03-28 2022-06-07 Amazon Technologies, Inc. Data access interface for clustered devices
US10621055B2 (en) 2017-03-28 2020-04-14 Amazon Technologies, Inc. Adaptive data recovery for clustered data devices
CN108683652A (en) * 2018-05-04 2018-10-19 北京奇安信科技有限公司 A kind of method and device of the processing attack of Behavior-based control permission
US11201897B1 (en) 2019-09-03 2021-12-14 Rapid7, Inc. Secure multiplexed routing
US11297036B1 (en) * 2019-09-03 2022-04-05 Rapid7, Inc. Single whitelisted ingress endpoint on 1 and 2 way TLS connections
CN113364821B (en) * 2020-03-04 2024-03-05 腾讯科技(深圳)有限公司 Function service access method, equipment and storage medium
CN111565180B (en) * 2020-04-28 2021-01-29 广州锦行网络科技有限公司 Virtual port protection system and method
WO2022040347A1 (en) * 2020-08-20 2022-02-24 Intrusion, Inc. System and method for monitoring and securing communications networks and associated devices
CN113923190B (en) * 2021-09-15 2023-11-28 北京达佳互联信息技术有限公司 Equipment identification jump identification method and device, server and storage medium

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5903721A (en) 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US6549538B1 (en) 1998-12-31 2003-04-15 Compaq Information Technologies Group, L.P. Computer method and apparatus for managing network ports cluster-wide using a lookaside list
FR2823936B1 (en) * 2001-04-19 2003-05-30 France Telecom METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO IP SERVICES
US7644436B2 (en) * 2002-01-24 2010-01-05 Arxceo Corporation Intelligent firewall
EP1488333B1 (en) * 2002-03-01 2010-10-06 Enterasys Networks, Inc. Location aware data network
JP2004112018A (en) 2002-09-13 2004-04-08 Johnson Controls Inc INTERNET ACCESS Web MONITOR AND CONTROL SYSTEM
US7386889B2 (en) * 2002-11-18 2008-06-10 Trusted Network Technologies, Inc. System and method for intrusion prevention in a communications network
US20050132060A1 (en) * 2003-12-15 2005-06-16 Richard Mo Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks
US20050220017A1 (en) 2004-03-31 2005-10-06 Brand Thomas E Denial of service protection through port hopping
US20060005227A1 (en) 2004-07-01 2006-01-05 Microsoft Corporation Languages for expressing security policies
US20070070996A1 (en) * 2005-09-26 2007-03-29 Oran David R Port hopping scheme for peer-to-peer connections
US7721091B2 (en) * 2006-05-12 2010-05-18 International Business Machines Corporation Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages
CA2703210A1 (en) 2007-10-24 2009-04-30 Jonathan Peter Deutsch Various methods and apparatuses for accessing networked devices without accessible addresses via virtual ip addresses
US7903566B2 (en) * 2008-08-20 2011-03-08 The Boeing Company Methods and systems for anomaly detection using internet protocol (IP) traffic conversation data
US8572717B2 (en) * 2008-10-09 2013-10-29 Juniper Networks, Inc. Dynamic access control policy with port restrictions for a network security appliance
US8578491B2 (en) * 2008-12-11 2013-11-05 Alcatel Lucent Network based malware detection and reporting
US8549625B2 (en) * 2008-12-12 2013-10-01 International Business Machines Corporation Classification of unwanted or malicious software through the identification of encrypted data communication
US8208418B1 (en) * 2009-01-16 2012-06-26 Extreme Networks, Inc. Methods, systems, and computer readable media for conserving multicast port list resources in an internet protocol (IP) packet forwarding device
US20110026529A1 (en) * 2009-07-31 2011-02-03 Saugat Majumdar Method And Apparatus For Option-based Marking Of A DHCP Packet
JP5357707B2 (en) 2009-11-11 2013-12-04 株式会社日立製作所 Gateway device and port number assigning method
US8880468B2 (en) 2010-07-06 2014-11-04 Nicira, Inc. Secondary storage architecture for a network control system that utilizes a primary network information base
US9124598B2 (en) * 2011-06-27 2015-09-01 Kaseya Limited Method and apparatus of establishing a connection between devices using cached connection information
CN102868943B (en) * 2011-07-04 2015-11-25 华为技术有限公司 A kind of method, optical network apparatus and system obtaining PON port association relation
US9813310B1 (en) * 2011-10-31 2017-11-07 Reality Analytics, Inc. System and method for discriminating nature of communication traffic transmitted through network based on envelope characteristics
US9100497B2 (en) * 2012-04-05 2015-08-04 Blackberry Limited Method, system and apparatus for managing persona-based notifications at a communication device
US8751650B2 (en) 2012-05-10 2014-06-10 Cisco Technology, Inc. Method and apparatus for supporting access control lists in a multi-tenant environment
US20140281546A1 (en) * 2013-03-13 2014-09-18 Eolas Technologies, Inc. HEDI-Hopping-Enabled Dynamically-secured Intercommunication (AKA SockHop)
US9992215B2 (en) * 2013-10-04 2018-06-05 Webroot Inc. Network intrusion detection

Also Published As

Publication number Publication date
KR20180099683A (en) 2018-09-05
US20180270257A1 (en) 2018-09-20
WO2017115356A1 (en) 2017-07-06
US20180007072A1 (en) 2018-01-04
EP3398291A1 (en) 2018-11-07
AU2016381499A1 (en) 2018-08-09
CA3006418A1 (en) 2017-07-06
SG11201804315TA (en) 2018-07-30
EP3398291A4 (en) 2019-06-26
US20170195348A1 (en) 2017-07-06
US9985981B2 (en) 2018-05-29
US10333956B2 (en) 2019-06-25
JP2019507412A (en) 2019-03-14
IL253178A0 (en) 2017-07-31
CN108476138A (en) 2018-08-31
US9794277B2 (en) 2017-10-17

Similar Documents

Publication Publication Date Title
HK1257825A1 (en) Detecting location within a network
IL253178B (en) Monitoring traffic in a computer network
HK1248038A1 (en) Reference signal in a communications network
HK1225900A1 (en) Application specific congestion control in a wireless network
GB201605194D0 (en) Energy management in a network
GB2525134B (en) Quantized congestion notification in a virtual networking system
EP3183904A4 (en) Optimizing network traffic management in a mobile network
HUE043236T2 (en) Network management
SG11201707454QA (en) Network management
EP3289725A4 (en) Device pairing in a local network
ZA201902904B (en) Enabling multiple numerologies in a network
GB2531677B (en) A network security system
GB2535819B (en) Monitoring network conditions
IL263111B (en) Logging of traffic in a computer network
PL3478013T3 (en) Resource controller for resource management in a telecommunication network
HK1207221A1 (en) Node de-duplication in a network monitoring system
GB201306186D0 (en) Network monitoring
GB201522546D0 (en) Power management in a power over data network
GB2532032B (en) Congestion monitoring
HK1222281A1 (en) Network management
PL3035721T3 (en) Resource sharing between devices in a wireless network
GB2526289B (en) Resource management in a cellular network
EP3155762A4 (en) Multi-peer routing in a network
GB201421164D0 (en) Scheduling traffic in a telecommunications network
GB2544803B (en) Managing security risk in a computer network

Legal Events

Date Code Title Description
FF Patent granted
KB Patent renewed